An attack in which the hacker persuades a telecom provider that the victims are activating their SIM card on a new device. A successful SIM swap will deactivate the victims' device and makes the attacker's device the destination for the victims' texts, calls, data, and accounts tied to their device.